search for: fatal_remove_all_cleanups

Displaying 6 results from an estimated 6 matches for "fatal_remove_all_cleanups".

2003 Jan 10
0
Core dump from sshd fatal_cleanup()
Hi All. While working on something I noticed core dumps from sshd. They don't seem to be related to what I was working on. It's from the process forked to run the shell. Just after the fork, fatal_remove_all_cleanups() is called, which looks like: fatal_remove_all_cleanups(void) { struct fatal_cleanup *cu, *next_cu; for (cu = fatal_cleanups; cu; cu = next_cu) { next_cu = cu->next; xfree(cu); } } It runs through free'ing the structs, but it leave...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...t login_grace_time; /* Disconnect if no auth in this time * (sec). */ diff -urN openssh-3.5p1-orig/session.c openssh-3.5p1/session.c --- openssh-3.5p1-orig/session.c 2002-12-18 10:10:13.000000000 -0500 +++ openssh-3.5p1/session.c 2002-12-18 10:42:37.000000000 -0500 @@ -466,7 +466,7 @@ fatal_remove_all_cleanups(); /* Child. Reinitialize the log since the pid has changed. */ - log_init(__progname, options.log_level, options.log_facility, log_stderr); + log_init(__progname, options.log_level, options.log_facility, log_stderr,NULL); /* * Create a new session and process group since the 4.4BS...
2002 Oct 13
1
[PATCH] AIX password expiration
...ble"); #endif /* USE_PAM */ +#ifdef WITH_AIXAUTHENTICATE + if (is_aix_password_change_required()) + packet_disconnect("Password change required but no " + "TTY available"); +#endif /* WITH_AIXAUTHENTICATE */ + /* Fork the child. */ if ((pid = fork()) == 0) { fatal_remove_all_cleanups(); @@ -757,6 +766,13 @@ } #endif +#ifdef WITH_AIXAUTHENTICATE + if (is_aix_password_change_required()) { + printf("%s\n", aixexpiremsg); + do_aix_change_password(pw); + } +#endif + if (check_quietlogin(s, command)) return; @@ -764,7 +780,10 @@ if (!is_pam_password_change_r...
2003 Jan 27
0
[Bug 375] sshd core dumping with msg "Cannot delete credentials"
...dtucker at zip.com.au 2003-01-27 11:39 ------- Assuming it's the fatal_cleanup() thing (there's no information to disprove this and it certainly looks like it), this is now fixed. 20030114 - markus at cvs.openbsd.org 2003/01/11 18:29:43 [log.c] set fatal_cleanups to NULL in fatal_remove_all_cleanups(); ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Oct 08
4
OS/390 openssh
...strupper(upper, NULL); + if ((pid = ufork(upper)) == -1 && errno == EPERM) { + log("Hint: Is the POSIX-RLOGIN-DEFAULT set for user %s ?", + s->pw->pw_name); + } + free(upper); + } + if (pid == 0) { +#else if ((pid = fork()) == 0) { +#endif fatal_remove_all_cleanups(); /* Child. Reinitialize the log since the pid has changed. */ @@ -530,7 +545,22 @@ #endif /* Fork the child. */ +#if #system(bs2000) + { + char *upper; + /* BS2000(PSD/POSIX) ufork needs the user name in UPPER case */ + upper = xstrdup(s->pw->pw_name); + strupper(...
2003 Aug 10
9
updated gssapi diff
...def GSSAPI +#include "ssh-gss.h" +#endif + /* func */ Session *session_new(void); @@ -409,6 +413,12 @@ session_proctitle(s); +#ifdef GSSAPI + temporarily_use_uid(s->pw); + ssh_gssapi_storecreds(); + restore_uid(); +#endif + /* Fork the child. */ if ((pid = fork()) == 0) { fatal_remove_all_cleanups(); @@ -517,6 +527,12 @@ ptyfd = s->ptyfd; ttyfd = s->ttyfd; +#ifdef GSSAPI + temporarily_use_uid(s->pw); + ssh_gssapi_storecreds(); + restore_uid(); +#endif + /* Fork the child. */ if ((pid = fork()) == 0) { fatal_remove_all_cleanups(); @@ -703,7 +719,7 @@ * Sets the value of...